Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 19:01
Static task
static1
Behavioral task
behavioral1
Sample
b8215f08dec82b73252d685c6a95f1cb525ecece88a58cb0d4030ce3e36c5d0d.exe
Resource
win10v2004-20230220-en
General
-
Target
b8215f08dec82b73252d685c6a95f1cb525ecece88a58cb0d4030ce3e36c5d0d.exe
-
Size
672KB
-
MD5
f1589264d15217a47bf687e3ac998553
-
SHA1
63f046e3fa0491c2568b09a80b180dfdcce2b2a0
-
SHA256
b8215f08dec82b73252d685c6a95f1cb525ecece88a58cb0d4030ce3e36c5d0d
-
SHA512
48bc541c29d869e5a72a2c4e061bf0976773b1cd1cda33dd8ed609f6b8edbaa9e6f78655e262016dba5947319c567e79188adb78e4fb6fe674cee71ec6249d07
-
SSDEEP
12288:MMroy903xbBOIoq9kD7JKyaxMPam3V2xVDD/O9m+8Su5mUz3:cyJquJKyaWSmlMKm+hU3
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro9096.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9096.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9096.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9096.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9096.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9096.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9096.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1476-191-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1476-192-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1476-194-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1476-196-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1476-198-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1476-200-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1476-202-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1476-204-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1476-206-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1476-208-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1476-210-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1476-212-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1476-214-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1476-216-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1476-218-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1476-220-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1476-222-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1476-224-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1476-1111-0x0000000004CA0000-0x0000000004CB0000-memory.dmp family_redline behavioral1/memory/1476-1113-0x0000000004CA0000-0x0000000004CB0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un582725.exepro9096.exequ8626.exesi207450.exepid process 3460 un582725.exe 3216 pro9096.exe 1476 qu8626.exe 948 si207450.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro9096.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9096.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9096.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
b8215f08dec82b73252d685c6a95f1cb525ecece88a58cb0d4030ce3e36c5d0d.exeun582725.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b8215f08dec82b73252d685c6a95f1cb525ecece88a58cb0d4030ce3e36c5d0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b8215f08dec82b73252d685c6a95f1cb525ecece88a58cb0d4030ce3e36c5d0d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un582725.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un582725.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 216 3216 WerFault.exe pro9096.exe 4504 1476 WerFault.exe qu8626.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro9096.exequ8626.exesi207450.exepid process 3216 pro9096.exe 3216 pro9096.exe 1476 qu8626.exe 1476 qu8626.exe 948 si207450.exe 948 si207450.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro9096.exequ8626.exesi207450.exedescription pid process Token: SeDebugPrivilege 3216 pro9096.exe Token: SeDebugPrivilege 1476 qu8626.exe Token: SeDebugPrivilege 948 si207450.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b8215f08dec82b73252d685c6a95f1cb525ecece88a58cb0d4030ce3e36c5d0d.exeun582725.exedescription pid process target process PID 1224 wrote to memory of 3460 1224 b8215f08dec82b73252d685c6a95f1cb525ecece88a58cb0d4030ce3e36c5d0d.exe un582725.exe PID 1224 wrote to memory of 3460 1224 b8215f08dec82b73252d685c6a95f1cb525ecece88a58cb0d4030ce3e36c5d0d.exe un582725.exe PID 1224 wrote to memory of 3460 1224 b8215f08dec82b73252d685c6a95f1cb525ecece88a58cb0d4030ce3e36c5d0d.exe un582725.exe PID 3460 wrote to memory of 3216 3460 un582725.exe pro9096.exe PID 3460 wrote to memory of 3216 3460 un582725.exe pro9096.exe PID 3460 wrote to memory of 3216 3460 un582725.exe pro9096.exe PID 3460 wrote to memory of 1476 3460 un582725.exe qu8626.exe PID 3460 wrote to memory of 1476 3460 un582725.exe qu8626.exe PID 3460 wrote to memory of 1476 3460 un582725.exe qu8626.exe PID 1224 wrote to memory of 948 1224 b8215f08dec82b73252d685c6a95f1cb525ecece88a58cb0d4030ce3e36c5d0d.exe si207450.exe PID 1224 wrote to memory of 948 1224 b8215f08dec82b73252d685c6a95f1cb525ecece88a58cb0d4030ce3e36c5d0d.exe si207450.exe PID 1224 wrote to memory of 948 1224 b8215f08dec82b73252d685c6a95f1cb525ecece88a58cb0d4030ce3e36c5d0d.exe si207450.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8215f08dec82b73252d685c6a95f1cb525ecece88a58cb0d4030ce3e36c5d0d.exe"C:\Users\Admin\AppData\Local\Temp\b8215f08dec82b73252d685c6a95f1cb525ecece88a58cb0d4030ce3e36c5d0d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un582725.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un582725.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9096.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9096.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 10804⤵
- Program crash
PID:216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8626.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8626.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 11364⤵
- Program crash
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si207450.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si207450.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 3216 -ip 32161⤵PID:1332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1476 -ip 14761⤵PID:3524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD535dddcf57f1b2252b881606d644839de
SHA1c9a5bb72beca91ffd5d2e74fd3d37a217013e81d
SHA2565709ea184dbee944005fd29ba50f48d1d074c5e4d727be819dd585e265e60590
SHA51225a5c6b86e892f8c475f35a71fb52a7ac7326d47bbfaaff592c3119716b289501c59e1552916836ad6b5fd5f1060051988025518aea0caf858d3c78d1022d170
-
Filesize
175KB
MD535dddcf57f1b2252b881606d644839de
SHA1c9a5bb72beca91ffd5d2e74fd3d37a217013e81d
SHA2565709ea184dbee944005fd29ba50f48d1d074c5e4d727be819dd585e265e60590
SHA51225a5c6b86e892f8c475f35a71fb52a7ac7326d47bbfaaff592c3119716b289501c59e1552916836ad6b5fd5f1060051988025518aea0caf858d3c78d1022d170
-
Filesize
530KB
MD5953d9c578446d6a0b3871b1155f0c640
SHA180656e083275df5ef832edc15ce8316d348619d2
SHA2566fd308119f8584a0234f588a69943b626a3bc47b33b71d192b14773f332ccda4
SHA512e3f1adcdcb75fa007e1330b8b0a8aedc0eb3d979de109d1f26f3c6b5fb731b6f8c0384ae412b302d3a898b20a537c255c9fbbb93a9d8a5638fcf314993fc03c6
-
Filesize
530KB
MD5953d9c578446d6a0b3871b1155f0c640
SHA180656e083275df5ef832edc15ce8316d348619d2
SHA2566fd308119f8584a0234f588a69943b626a3bc47b33b71d192b14773f332ccda4
SHA512e3f1adcdcb75fa007e1330b8b0a8aedc0eb3d979de109d1f26f3c6b5fb731b6f8c0384ae412b302d3a898b20a537c255c9fbbb93a9d8a5638fcf314993fc03c6
-
Filesize
259KB
MD5f540e7354b397b499ce46688313fbaf0
SHA10acddfb282429b205b292fe5a6b0490e9fbeee24
SHA25695b5f4904efb2a2cbd772e008a42be68ae14bee7466abc50efaef620986084b1
SHA512598eeccde030e025551a3a4767fe3d8639c7b4a6d883c2f931fd46ba311fb64f9f8d13acf224558561a87597e4dc7fc3bbcc697b7f6f3fdb07ec0079f54367f8
-
Filesize
259KB
MD5f540e7354b397b499ce46688313fbaf0
SHA10acddfb282429b205b292fe5a6b0490e9fbeee24
SHA25695b5f4904efb2a2cbd772e008a42be68ae14bee7466abc50efaef620986084b1
SHA512598eeccde030e025551a3a4767fe3d8639c7b4a6d883c2f931fd46ba311fb64f9f8d13acf224558561a87597e4dc7fc3bbcc697b7f6f3fdb07ec0079f54367f8
-
Filesize
318KB
MD5e678786068b4d45f9d43c2c148c060da
SHA1b298f4e61ee63ad8bd4a7318358d25940ebcbe1c
SHA256358d7c1668e2a7711bea14e17af81b888691faac5ae36776248dc3e96c441de0
SHA512a332bc490017c04cd723f80b250e5da90ff2edd221bb4b777ed9e41fcfe78ca753a3742b6dbfd563aa9b4910033a163afb7edca099a805edc1f327dad681a3ca
-
Filesize
318KB
MD5e678786068b4d45f9d43c2c148c060da
SHA1b298f4e61ee63ad8bd4a7318358d25940ebcbe1c
SHA256358d7c1668e2a7711bea14e17af81b888691faac5ae36776248dc3e96c441de0
SHA512a332bc490017c04cd723f80b250e5da90ff2edd221bb4b777ed9e41fcfe78ca753a3742b6dbfd563aa9b4910033a163afb7edca099a805edc1f327dad681a3ca